We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 1-20 of 762 results
  1. Attribute-based encryption and sticky policies for data access control in a smart home scenario: a comparison on networked smart object middleware

    Regulating the access to the Internet of Things (IoT) network’s resources is a complex-prone task, which requires to pay a great attention on how...

    Sabrina Sicari, Alessandra Rizzardi, ... Alberto Coen-Porisini in International Journal of Information Security
    Article Open access 23 November 2020
  2. Lessons on off-policy methods from a notification component of a chatbot

    This work serves as a review of our experience applying off-policy techniques to train and evaluate a contextual bandit model powering a...

    Scott Rome, Tianwen Chen, ... Ding Zhou in Machine Learning
    Article 04 May 2021
  3. Category Creation Between Digital and Analog Sensemaking Tools in a Cognitive Immersive Environment

    This paper compares the category creation process during a user study experiment in a cognitive immersive sensemaking environment between an analog...
    Shannon Briggs, Matthew Peveler, ... Jonas Braasch in Human Interface and the Management of Information: Visual and Information Design
    Conference paper 2022
  4. The rise of “security and privacy”: bibliometric analysis of computer privacy research

    The study of security and computer privacy has become a significant focus in security and privacy research. To reflect a website's, service's, or...

    Auwal Shehu Ali, Zarul Fitri Zaaba, Manmeet Mahinderjit Singh in International Journal of Information Security
    Article 31 October 2023
  5. Loft: An Architecture for Lifetime Management of Privacy Data in Service Cooperation

    With the fast development of information technology, more and more computation applications are served in the cloud and cooperate together to provide...
    Cong Zha, Zhenan Xu, ... Hao Yin in Ubiquitous Security
    Conference paper 2024
  6. Ontology-Based Interaction Design for Social-Ecological Systems Research

    Contemporary social-ecological systems (SESs) research that supports policy and decision-making to tackle sustainability issues requires...
    Max Willis, Greta Adamo in Research Challenges in Information Science
    Conference paper 2024
  7. Studying topic engagement and synergy among candidates for 2020 US Elections

    This article provides a comprehensive summary of how candidates running in the 2020 US Presidential Elections used Twitter to communicate with the...

    Manmeet Kaur Baxi, Rajesh Sharma, Vijay Mago in Social Network Analysis and Mining
    Article 11 September 2022
  8. Language Ideology Bias in Conversational Technology

    The beliefs that we have about language are called language ideologies and influence how we create and use language technologies. In this paper, we...
    Sviatlana Höhn, Bettina Migge, ... Sjouke Mauw in Chatbot Research and Design
    Conference paper 2024
  9. Data Usage Control

    Data-driven business models are based on sharing and exchanging data. However, to establish a trustworthy and secure data exchange between different...
    Christian Jung, Jörg Dörr in Designing Data Spaces
    Chapter Open access 2022
  10. Development

    During software development iterations, we create computer programs. Programs, or more precisely software source code files, are examples of...
    Julian Michael Bass in Agile Software Engineering Skills
    Chapter 2023
  11. The value sensitive design of a preventive health check app

    In projects concerning big data, ethical questions need to be answered during the design process. In this paper the Value Sensitive Design method is...

    Litska Strikwerda, Marlies van Steenbergen, ... Jeroen van Grondelle in Ethics and Information Technology
    Article Open access 31 August 2022
  12. Challenges of Cyber Security in Insurance Business

    Greater use of information technology, electronic communication and digitization, exposes business entities to cyber threats and endangers their...
    Mihelja Žaja Maja, Andelinovic Mihovil, Stverkova Hana in Research and Innovation Forum 2023
    Conference paper 2024
  13. Introduction

    Crops are the basis of human survival, and the growth state and yield of crops are not only vital to agricultural production, but also to the healthy...
    Ru**g Wang, Lin Jiao, Kang Liu in Deep Learning for Agricultural Visual Perception
    Chapter 2023
  14. eSticky: An Advanced Remote Reminder System for People with Early Dementia

    While the European population is ageing, the number of people with dementia is dramatically rising. With this comes an increased need for products...

    Christos Mettouris, Alexandros Yeratziotis, ... George A. Papadopoulos in SN Computer Science
    Article 15 April 2023
  15. Strategy

    Serverless architecture is quite unlike the previous evolutions of cloud software. As such, existing cloud management strategies are often...
    Chapter 2023
  16. Tock Systems Management

    So far, the chapters in this book have focused on application and system development using Tock. In a development environment, deploying a custom...
    Alexandru Radovici, Ioana Culic in Getting Started with Secure Embedded Systems
    Chapter 2022
  17. Adaptive context-aware access control for IoT environments leveraging fog computing

    The increasing use of the Internet of Things (IoT) has driven the demand for enhanced and robust access control methods to protect resources from...

    Rudri Kalaria, A. S. M. Kayes, ... Ahmad Salehi Shahraki in International Journal of Information Security
    Article Open access 08 July 2024
  18. Is academia becoming more localised? The growth of regional knowledge networks within international research collaboration

    It is well-established that the process of learning and capability building is core to economic development and structural transformation. Since...

    John Fitzgerald, Sanna Ojanperä, Neave O’Clery in Applied Network Science
    Article Open access 31 May 2021
  19. Eight grand challenges for value sensitive design from the 2016 Lorentz workshop

    In this article, we report on eight grand challenges for value sensitive design, which were developed at a one-week workshop, Value Sensitive Design:...

    Batya Friedman, Maaike Harbers, ... Nick Logler in Ethics and Information Technology
    Article Open access 01 March 2021
  20. Towards Privacy-Preserving Machine Learning in Sovereign Data Spaces: Opportunities and Challenges

    The world of big data has unlocked novel avenues for organizations to generate value via sharing data. Current data ecosystem initiatives such as...
    Mehdi Akbari Gurabi, Felix Hermsen, ... Stefan Decker in Privacy and Identity Management. Sharing in a Digital World
    Conference paper 2024
Did you find what you were looking for? Share feedback.